Overview
overview
8Static
static
807-30 B �... B.exe
windows7-x64
807-30 B �... B.exe
windows10-2004-x64
807-30 B �...ne.exe
windows7-x64
807-30 B �...ne.exe
windows10-2004-x64
807-30 B �...��.bat
windows7-x64
807-30 B �...��.bat
windows10-2004-x64
8@创e下�...��.url
windows7-x64
1@创e下�...��.url
windows10-2004-x64
1安卓手�...��.url
windows7-x64
1安卓手�...��.url
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 01:42
Behavioral task
behavioral1
Sample
07-30 B 周年稳定版)/DNF飞机 07-30 B.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
07-30 B 周年稳定版)/DNF飞机 07-30 B.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
07-30 B 周年稳定版)/Theplane.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
07-30 B 周年稳定版)/Theplane.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
07-30 B 周年稳定版)/打不开飞机-点击我启动飞机.bat
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
07-30 B 周年稳定版)/打不开飞机-点击我启动飞机.bat
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
@创e下载┆9年绿色无弹窗安全.url
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
@创e下载┆9年绿色无弹窗安全.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
安卓手机版本下载.url
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
安卓手机版本下载.url
Resource
win10v2004-20221111-en
General
-
Target
07-30 B 周年稳定版)/Theplane.exe
-
Size
2.3MB
-
MD5
1ec395eef7d5cc1833c121532f0e232b
-
SHA1
18d326d98189b324bf86b0683d54a3c3100d0e48
-
SHA256
acf1ac838ea940bccc84277a76fd8dbecc0e21bcae5140fe1782e11be2165f24
-
SHA512
6621f98ca4ff338027fa9dd0cf4227fcafe84f0e2b3adbea35abb896fcfa4054b83e1273e603d31ed979dfb4837a5b8adfcc84b8326ec70d502d85a3673183ad
-
SSDEEP
24576:FQLf4Xvi7/RS7gndLR3IKOCKfJunXKo9yHSAzIZq8y4D3plQ21myoSlxRgVec/MT:FeXsqxLfQ2Ayokgf8veJmb
Malware Config
Signatures
-
resource yara_rule behavioral3/memory/2020-55-0x0000000002280000-0x00000000022F2000-memory.dmp upx behavioral3/memory/2020-56-0x0000000002280000-0x00000000022F2000-memory.dmp upx behavioral3/memory/2020-58-0x0000000002280000-0x00000000022F2000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376348026" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{090F6BA1-6E97-11ED-AF38-FE72C9E2D9C9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main Theplane.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004775eac10e2c2f429a3d6912e904f88d0000000002000000000010660000000100002000000072cbdd62d2e56f335e948346b30021c1c1346d88769601d61a5c491032564653000000000e80000000020000200000003d2aec06094978a8f83183123681c4fcfb5dd8ac954cc1a9cd2e54c09b49c3a320000000f33fa40a92fda4d61c2d394827528f1c78d192bc09b2ecad882fe1ff7f91212e4000000073ebbd522a7e3c236305d7a52cb750f70c0ebc10316708b5fe8298cfe161d4a141ce82eae9ea576d6bb42a5031e035e36ddbd222eab84db333f9e4908d0cc47e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e05685e0a302d901 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe Token: 33 2020 Theplane.exe Token: SeIncBasePriorityPrivilege 2020 Theplane.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 856 iexplore.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 2020 Theplane.exe 856 iexplore.exe 856 iexplore.exe 428 IEXPLORE.EXE 428 IEXPLORE.EXE 428 IEXPLORE.EXE 428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2020 wrote to memory of 856 2020 Theplane.exe 28 PID 2020 wrote to memory of 856 2020 Theplane.exe 28 PID 2020 wrote to memory of 856 2020 Theplane.exe 28 PID 2020 wrote to memory of 856 2020 Theplane.exe 28 PID 856 wrote to memory of 428 856 iexplore.exe 29 PID 856 wrote to memory of 428 856 iexplore.exe 29 PID 856 wrote to memory of 428 856 iexplore.exe 29 PID 856 wrote to memory of 428 856 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\07-30 B 周年稳定版)\Theplane.exe"C:\Users\Admin\AppData\Local\Temp\07-30 B 周年稳定版)\Theplane.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.dnffeiji.com/dc.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:856 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:428
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
601B
MD5db00269a3070f8e2523546dcb7dd3b67
SHA1469f22d14657e6392506dba04f95222bc8fde8c7
SHA2568027a467748d3c9acdb4cb5779d054b0920558ca3b487e4142ef21943c5626a6
SHA512acdbf82ca4fafde47850c9e415a980f7ffe76ced286f033ffa122f7c11fcb7d0442db7090ba085f37b9637f876a1c384e51a5db2bd6eabe22ad6288859b8cef8